Forem

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
CVE-2025-48543: Android Runtime Use-After-Free Vulnerability
Cover image for CVE-2025-48543: Android Runtime Use-After-Free Vulnerability

CVE-2025-48543: Android Runtime Use-After-Free Vulnerability

1
Comments
1 min read
How I Protect 6 Apps for $0/Month with SafeLine WAF

How I Protect 6 Apps for $0/Month with SafeLine WAF

10
Comments
3 min read
🔐 10 Core Concepts Every Developer Should Know About Data Security

🔐 10 Core Concepts Every Developer Should Know About Data Security

2
Comments
3 min read
Teaching Security Scanners to Remember - Using Vector Embeddings to Stop Chasing Ghost Ports

Teaching Security Scanners to Remember - Using Vector Embeddings to Stop Chasing Ghost Ports

1
Comments
4 min read
Blame Game - picoCTF writeups
Cover image for Blame Game - picoCTF writeups

Blame Game - picoCTF writeups

2
Comments
1 min read
Industry-Specific Data Security: Protecting Sensitive Data Before It’s Too Late
Cover image for Industry-Specific Data Security: Protecting Sensitive Data Before It’s Too Late

Industry-Specific Data Security: Protecting Sensitive Data Before It’s Too Late

1
Comments
3 min read
Why I Built a Free Security Scanner That Makes Sense
Cover image for Why I Built a Free Security Scanner That Makes Sense

Why I Built a Free Security Scanner That Makes Sense

4
Comments 1
5 min read
Why the Principle of Least Privilege Is Critical for Non-Human Identities
Cover image for Why the Principle of Least Privilege Is Critical for Non-Human Identities

Why the Principle of Least Privilege Is Critical for Non-Human Identities

Comments
7 min read
LoongCollector Security Log Ingestion Practice: Standardized Log Collection for Enterprise Firewall Scenarios

LoongCollector Security Log Ingestion Practice: Standardized Log Collection for Enterprise Firewall Scenarios

Comments
10 min read
Are Cybersecurity Jobs Safe from AI?
Cover image for Are Cybersecurity Jobs Safe from AI?

Are Cybersecurity Jobs Safe from AI?

2
Comments
5 min read
Cómo implementar AWS Network Firewall en una arquitectura multicuenta utilizando Transit Gateway
Cover image for Cómo implementar AWS Network Firewall en una arquitectura multicuenta utilizando Transit Gateway

Cómo implementar AWS Network Firewall en una arquitectura multicuenta utilizando Transit Gateway

2
Comments
22 min read
GDPR Compliance: Building Websites That Comply with European Data Protection Laws
Cover image for GDPR Compliance: Building Websites That Comply with European Data Protection Laws

GDPR Compliance: Building Websites That Comply with European Data Protection Laws

Comments
3 min read
How to Implement AWS Network Firewall in a Multi-Account Architecture Using Transit Gateway
Cover image for How to Implement AWS Network Firewall in a Multi-Account Architecture Using Transit Gateway

How to Implement AWS Network Firewall in a Multi-Account Architecture Using Transit Gateway

Comments
19 min read
Cybersecurity in 2025: Are We Really Ready?

Cybersecurity in 2025: Are We Really Ready?

Comments 1
1 min read
Packet-Level Security: How to Monitor and Detect Network Attacks with Nmap and Wireshark
Cover image for Packet-Level Security: How to Monitor and Detect Network Attacks with Nmap and Wireshark

Packet-Level Security: How to Monitor and Detect Network Attacks with Nmap and Wireshark

1
Comments
3 min read
Outil de Cybersécurité du Jour - Sep 11, 2025

Outil de Cybersécurité du Jour - Sep 11, 2025

1
Comments
3 min read
The Hidden Power of SafeLine WAF: Load Balancing & Failover on Top of Security

The Hidden Power of SafeLine WAF: Load Balancing & Failover on Top of Security

6
Comments
3 min read
XXE Injection in React.js — What It Is and How to Prevent It
Cover image for XXE Injection in React.js — What It Is and How to Prevent It

XXE Injection in React.js — What It Is and How to Prevent It

3
Comments
3 min read
Outil de Cybersécurité du Jour - Oct 3, 2025

Outil de Cybersécurité du Jour - Oct 3, 2025

1
Comments
3 min read
6 AI Models vs. 3 Advanced Security Vulnerabilities

6 AI Models vs. 3 Advanced Security Vulnerabilities

Comments
9 min read
I Analyzed 100 Claude MCP Servers and Found Critical Security Flaws in 43% of Them

I Analyzed 100 Claude MCP Servers and Found Critical Security Flaws in 43% of Them

4
Comments 2
5 min read
Critical SQL Injection Vulnerability in Weaver e-cology OA: What You Need to Know

Critical SQL Injection Vulnerability in Weaver e-cology OA: What You Need to Know

10
Comments
2 min read
Are you hacked?
Cover image for Are you hacked?

Are you hacked?

Comments
4 min read
⚡Building a Scalable Authentication Layer That Cuts Development Time by 60%
Cover image for ⚡Building a Scalable Authentication Layer That Cuts Development Time by 60%

⚡Building a Scalable Authentication Layer That Cuts Development Time by 60%

9
Comments
1 min read
Discover The SSL/TLS Security Analyzer API
Cover image for Discover The SSL/TLS Security Analyzer API

Discover The SSL/TLS Security Analyzer API

Comments
2 min read
loading...